[1]
|
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J. and Kalker, T. (2008) Digital Watermarking and Steganography. 2nd Edition. Morgan Kaufmann, San Francisco.
|
[2]
|
Hsu, C.S. and Tu, S.F. (2010) Probability-Based Tampering Detection Scheme for Digital Images. Optics Communications, 283, 1737-1743. https://doi.org/10.1016/j.optcom.2009.12.073
|
[3]
|
Hong, W., Chen, T.S. and Shiu, C.W. (2009) Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors. Journal of systems and Software, 82, 1833-1842. https://doi.org/10.1016/j.jss.2009.05.051
|
[4]
|
Provos, N. and Honyman, P. (2003) Hide and Seek: An Introduction To Steganography. IEEE Security and Privacy Magazine, 1, 32-44. https://doi.org/10.1109/MSECP.2003.1203220
|
[5]
|
Xu, H., Wang, J. and Kim, H.J. (2010) Near-Optimal Solution to Pair-Wise LSB Matching via An Immune Programming Strategy. Information Sciences, 180, 1201-1217. https://doi.org/10.1016/j.ins.2009.12.027
|
[6]
|
Wu, D.C. and Tsai, W.H. (2003) A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 24, 1613-1626. https://doi.org/10.1016/S0167-8655(02)00402-6
|
[7]
|
Wang, C.M., Wu, N.I., Tsai, C.S. and Hwang, M.S. (2008) A High Quality Steganographic Method with Pixel-Value Differencing and Modulus Function. Journal of Systems and Software, 81, 150-158.
https://doi.org/10.1016/j.jss.2007.01.049
|
[8]
|
Joo, J.C., Lee, H.Y. and Lee, H.K. (2010) Improved Steganographic Method Preserving Pixel-Value Differencing Histogram With Modulus Function. EURASIP Journal on advances in signal processing, 1, 1-13.
|
[9]
|
Luo, W., Huang, F. and Huang, J. (2010) Edge Adaptive Image Steganography Based on LSB Matching Revisited. IEEE Transactions on Information Forensics and Security, 5, 201-214. https://doi.org/10.1109/TIFS.2010.2041812
|
[10]
|
Yang, C.H., Weng, C.Y., Wang, S.J. and Sun, H.M. (2008) Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security, 3, 488-497.
https://doi.org/10.1109/TIFS.2008.926097
|
[11]
|
Luo, D.C., Wu, N.I., Wang, C.M., Lin, Z.H. and Tsai, C.S. (2010) A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity. Journal of Systems and Software, 83, 1236-1248.
https://doi.org/10.1016/j.jss.2010.01.050
|
[12]
|
Chang, K.C., Huang, P.S., Tu, T.M. and Chang, C.P. (2007) Adaptive Image Stegannographic Scheme Based on Tri-Way Pixel-Value Differencing. ISIC IEEE Internation Conference, 1165-1170.
|
[13]
|
Jung, K.H., Ha, K.J. and Yoo, K.Y. (2008) Image Data Hiding Method Based on Multi-Pixel Differencing and LSB Substitution Methods. International Conference on Convergence and Hybrid Information Technoligy, 355-358.
https://doi.org/10.1109/ICHIT.2008.279
|
[14]
|
Balasubramanian, C., Selvakumar, S. and Geetha, S. (2014) High Payload Image Steganography with Reduced Distortion Using Octonary Pixel Pairing Scheme. Multimedia Tools and Applications, 73, 2223-2245.
https://doi.org/10.1007/s11042-013-1640-4
|
[15]
|
Jung, K.H. and Yoo, K.Y. (2014) High-Capacity Index Based Data Hiding Method. Multimedia Tools and Applications.
|
[16]
|
Lee, C.F., Chen, H.L. and Tso, H.K. (2010) Embedding Capacity Raising in Reversible Data Hiding Based on Prediction of Difference Expansion. Journal of Systems and Software, 83, 1864-1872.
https://doi.org/10.1016/j.jss.2010.05.078
|
[17]
|
Zeng, X.T., Li, Z. and Ping, L.D. (2012) Reversible Data Hiding Scheme Using Reference Pixel and Multilayer Embedding. AEU International Journal of Electronics Communication, 66, 532-539.
https://doi.org/10.1016/j.aeue.2011.11.004
|
[18]
|
Hong, W. (2013) Adaptive Image Data Hiding in Edges Using Patched Reference Table and Pair-Wise Embedding Technique. Information Sciences, 221, 473-489. https://doi.org/10.1016/j.ins.2012.09.013
|
[19]
|
Wang, Z. and Bovik, A.C. (2002) A Universal Image Quality Index. IEEE Signal Processing Letters, 9, 81-84.
https://doi.org/10.1109/97.995823
|
[20]
|
Fridrich, J., Goljan, M. and Du, R. (2001) Reliable Detection of LSB Steganography in Grayscale and Color Images. Proceedings of ACM Workshop on Multimedia and Security, 27-30. https://doi.org/10.1145/1232454.1232466
|
[21]
|
Zhang, X.P. and Wang, S.Z. (2004) Vulnerability of Pixel-Value Differencing Steganography to Histogram Analyais and Modification for Enhanced Security. Pattern Recognition Letters, 331-339.
https://doi.org/10.1016/j.patrec.2003.10.014
|
[22]
|
Yang, C.H., Wang, C.Y. and Sun, H.M. (2008) Information Hiding Technique Based on Blocked PVD. Journal of Inforamtion Management, 15, 29-48.
|